共 50 条
- [12] Validation of computer models for homeland security purposes 2005 IEEE NUCLEAR SCIENCE SYMPOSIUM CONFERENCE RECORD, VOLS 1-5, 2005, : 297 - 301
- [13] Formal Models for Analyzing Security Protocols: Some Lecture Notes DEPENDABLE SOFTWARE SYSTEMS ENGINEERING, 2016, 45 : 33 - 58
- [15] The new topicality of using Formal Models of Security Policy within the security engineering process APPLIED FORMAL METHODS - FM-TRENDS 98, 1999, 1641 : 302 - 310
- [16] Enabling Security Checking of Automotive ECUs with Formal CSP Models 2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2019, : 90 - 97
- [17] Formal affordance-based models of computer virus reproduction JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (04): : 289 - 306
- [18] Teaching Formal Methods in Application Domains A Case Study in Computer and Network Security FORMAL METHODS TEACHING, FMTEA 2024, 2024, 14939 : 124 - 140
- [19] Soundness conditions for message encoding abstractions in formal security protocol models ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 72 - 79